I need help with these 2 questionsthey are partially correct

I need help with these 2 questions...they are \"partially\" correct...something is wrong with both of them:

The following are among the well-known and accepted security concepts. Choose only the answers that are correct.

Obfuscation, which is effective because it means things are hidden

Confidentiality, Integrity, Availability

Rainbow tables used to generate random user passwords

Logging, Monitoring, Auditing

Non-repudiation via Digital Signature

Access Control

Graphical User Interface

(I chose 1,2,4,5,6) This was partially wrong, so something is right about it, but something is wrong as well.

Which of the following devices can be used in a network to provide for security. Choose All of the correct ones from this list.

Packet filtering routers with Access Control Lists (ACLs) that are reviewed monthly or any time there is a notification from reliable sources of a new method for attacking network-level infrastructure.

High performance automated email scanning devices used to input data directly into accounts payable records.

Virtual Private Network (VPN) devices based on well-known protocols such as SSL version 3 or TLS.

Large Level 2 Cache Memory so that CPU performance is enhanced.

Intrusion Detection System (IDS)

Subscription to vulnerability information services and other security news services so that administrators may stay informed about important information.

Software developed by former employees where the source code is not under any maintenance contract, but for which there is no ongoing support costs because budget concerns would not allow for either a replacement or maintenance. The software has never failed in anyone\'s memory.

(I chose 1,3,5). This was partially wrong, so something is right about it, but something is wrong as well

Obfuscation, which is effective because it means things are hidden

Confidentiality, Integrity, Availability

Solution

Answer for 1st question would be 2, 5, and 6. I will explain why 1, and 4 are not the answer.

1 - Obfuscation - It is just data hiding or confusing user by using various jargaon. There is no algorithmic way to encode and secure data.

4 - Logging, Monitoring, and Auditing - There is no way to secure your data using these three methods. These are just used for maintenance purpose of software.

Answer for 2nd question would be 1, and 3.

5 - IDS is just a way of detecting any attacks, it does not solve the problem of preventing attacks.

I need help with these 2 questions...they are \

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site